IEEE/CAA Journal of Automatica Sinica
Citation: | Y. K. Shi, Y. Q. Wang, and J. Y. Tuo, “Distributed secure state estimation of multi-agent systems under homologous sensor attacks,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 67–77, Jan. 2023. doi: 10.1109/JAS.2022.105920 |
[1] |
Y. Yang, Y. Xiao, and T. Li, “A survey of autonomous underwater vehicle formation: Performance, formation control, and communication capability,” IEEE Comm. Surveys &Tutorials, vol. 23, no. 2, pp. 815–841, 2021.
|
[2] |
Y. Yang, Y. Xiao, and T. Li, “Attacks on formation control for multi-agent systems,” IEEE Trans. Cybernetics, 2021. DOI: 10.1109/TCYB.2021.3089375.
|
[3] |
R. Langner, “Stuxnet: Dissecting a cyberwarfare weapon,” IEEE Security &Privacy, vol. 9, no. 3, pp. 49–51, 2011.
|
[4] |
A. West, “Marine pollution from vessel sewage in queensland,” Mlaanz Journal, vol. 18, p. 126, 2004.
|
[5] |
X. Wang, D. Ding, X. Ge, and Q.-L. Han, “Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: The adaptive event-triggered case,” Int. J. Robust and Nonlinear Control, vol. 32, no. 5, pp. 2760–2779, 2022. doi: 10.1002/rnc.5831
|
[6] |
S. Wang, L. Chen, D. Gu, and H. Hu, “Cooperative localization of AUVS using moving horizon estimation,” IEEE/CAA J. Autom. Sinica, vol. 1, no. 1, pp. 68–76, 2014. doi: 10.1109/JAS.2014.7004622
|
[7] |
Y. Zhang, L. Du, and F. L. Lewis, “Stochastic DoS attack allocation against collaborative estimation in sensor networks,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1225–1234, 2020.
|
[8] |
D. Han, Y. Mo, and L. Xie, “Convex optimization based state estimation against sparse integrity attacks,” IEEE Trans. Autom. Control, vol. 64, no. 6, pp. 2383–2395, 2019. doi: 10.1109/TAC.2019.2891458
|
[9] |
H. Fawzi, Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Trans. Automatic Control, vol. 59, no. 6, pp. 1454–1467, 2014. doi: 10.1109/TAC.2014.2303233
|
[10] |
M. Pajic, I. Lee, and G. J. Pappas, “Attack-resilient state estimation for noisy dynamical systems,” IEEE Trans. Control of Network Systems, vol. 4, no. 1, pp. 82–92, 2016.
|
[11] |
Y. Shoukry and Tabuada, “Event-triggered state observers for sparse sensor noise/attacks,” IEEE Trans. Automatic Control, vol. 61, no. 8, pp. 2079–2091, 2015.
|
[12] |
D. Ding, Q.-L. Han, X. Ge, and J. Wang, “Secure state estimation and control of cyber-physical systems: A survey,” IEEE Trans. Systems,Man,and Cybernetics: Systems, vol. 51, no. 1, pp. 176–190, 2020.
|
[13] |
V. Ugrinovskii, “Conditions for detectability in distributed consensus-based observer networks,” IEEE Trans. Automatic Control, vol. 58, no. 10, pp. 2659–2664, 2013. doi: 10.1109/TAC.2013.2256675
|
[14] |
X. Ge, Q.-L. Han, X.-M. Zhang, L. Ding, and F. Yang, “Distributed event-triggered estimation over sensor networks: A survey,” IEEE Trans. Cybernetics, vol. 50, no. 3, pp. 1306–1320, 2019.
|
[15] |
Millán, L. Orihuela, C. Vivas, and F. R. Rubio, “Distributed consensus-based estimation considering network induced delays and dropouts,” Automatica, vol. 48, no. 10, pp. 2726–2729, 2012. doi: 10.1016/j.automatica.2012.06.093
|
[16] |
X. Ge, Q.-L. Han, M. Zhong, and X.-M. Zhang, “Distributed krein space-based attack detection over sensor networks under deception attacks,” Automatica, vol. 109, p. 108557, 2019.
|
[17] |
H. Song, D. Ding, H. Dong, and X. Yi, “Distributed filtering based on cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks,” Automatica, vol. 135, p. 110004, 2022.
|
[18] |
D. Zhang, G. Feng, Y. Shi, and D. Srinivasan, “Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 2, pp. 319–333, 2021. doi: 10.1109/JAS.2021.1003820
|
[19] |
X. Guo, D. Zhang, J. Wang, and C. K. Ahn, “Adaptive memory event-triggered observer-based control for nonlinear multi-agent systems under dos attacks,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 10, pp. 1644–1656, 2021. doi: 10.1109/JAS.2021.1004132
|
[20] |
M. Meng, X. Li, and G. Xiao, “Distributed estimation under sensor attacks: Linear and nonlinear measurement models,” IEEE Trans. Signal and Information Processing Networks, vol. 7, pp. 156–165, 2021. doi: 10.1109/TSIPN.2021.3054981
|
[21] |
Y. Chen, S. Kar, and J. M. Moura, “Resilient distributed estimation: Sensor attacks,” IEEE Trans. Automatic Control, vol. 64, no. 9, pp. 3772–3779, 2018.
|
[22] |
X. He, X. Ren, H. Sandberg, and K. H. Johansson, “How to secure distributed filters under sensor attacks,” IEEE Trans. Automatic Control, 2021. DOI: 10.1109/TAC.2021.3092603.
|
[23] |
X.-C. Jia, “Resource-efficient and secure distributed state estimation over wireless sensor networks: A survey,” Int. J. Systems Science, vol. 52, no. 16, pp. 3368–3389, 2021. doi: 10.1080/00207721.2021.1998843
|
[24] |
C. Liu, Y. Wang, D. Zhou, and X. Shen, “Minimum-variance unbiased unknown input and state estimation for multi-agent systems by distributed cooperative filters,” IEEE Access, vol. 6, pp. 18128–18141, 2018.
|
[25] |
C. Liu, Y. Xu, J. Li, and J. Tuo, “Distributed semi-cooperative filter for a nonlinear multi-agent system with heterogeneous and homologous unknown inputs,” The Canadian J. Chemical Engineering, vol. 98, no. 12, pp. 2574–2586, 2020. doi: 10.1002/cjce.23837
|
[26] |
Y. Shi, C. Liu, and Y. Wang, “Asymptotically stable filter for MVU estimation of states and homologous unknown inputs in heterogeneous multiagent systems,” IEEE Trans. Automation Science and Engineering, vol. 19, no. 2, pp. 884–894, 2022. doi: 10.1109/TASE.2021.3060075
|
[27] |
Y. Shi and Y. Wang, “Online secure state estimation of multiagent systems using average consensus,” IEEE Trans. Systems,Man,and Cybernetics: Systems, vol. 52, no. 5, pp. 3174–3186, 2022. doi: 10.1109/TSMC.2021.3064658
|
[28] |
Y. Shi, C. Liu, and Y. Wang, “Secure state estimation of multiagent systems with homologous attacks using average consensus,” IEEE Trans. Control of Network Systems, vol. 8, no. 3, pp. 1293–1303, 2021. doi: 10.1109/TCNS.2021.3062472
|
[29] |
E. D. Kaplan and C. Hegarty, Understanding GPS/GNSS: Principles and Applications. London, UK: Artech House, 2017.
|
[30] |
R. Olfati-Saber and Jalalkamali, “Coupled distributed estimation and control for mobile sensor networks,” IEEE Trans. Automatic Control, vol. 57, no. 10, pp. 2609–2614, 2012. doi: 10.1109/TAC.2012.2190184
|
[31] |
F. Zhang, The Schur Complement and its Applications. Berlin, Heidelberg, Germany: Springer Science & Business Media, 2006.
|
[32] |
L. El Ghaoui, F. Oustry, and M. AitRami, “A CONE plementarity linearization algorithm for static output-feedback and related problems,” IEEE Trans. Automatic Control, vol. 42, no. 8, pp. 1171–1176, 1997. doi: 10.1109/9.618250
|
[33] |
Y. S. Moon, Pa rk, W. H. Kwon, and Y. S. Lee, “Delay-dependent robust stabilization of uncertain state-delayed systems,” Int. J. Control, vol. 74, no. 14, pp. 1447–1455, 2001. doi: 10.1080/00207170110067116
|
[34] |
T.-G. Park and K.-S. Lee, “Process fault isolation for linear systems with unknown inputs,” IEE Proceedings-Control Theory and Applications, vol. 151, no. 6, pp. 720–726, 2004. doi: 10.1049/ip-cta:20040796
|